After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Encryption Flaw "Heartbleed" Creates Data Risk: How Insurance Can Stanch the Bleeding -
In early April, news broke of an encryption flaw named “Heartbleed” that exposed companies to data breaches for over two and one...more
In the final written decision of the second covered business method (CBM) patent review, the Patent Trial and Appeals Board (PTAB) cancelled all claims under review, noting that instituting a CBM review based on a...more
You are a device maker, an app or software developer, a potential investor, a healthcare provider, a healthcare payor or an insurer and you see opportunities in mobile health (mHealth). You have an idea for a revolutionary...more
The constant threat of cyberattacks presents many and varying challenges for businesses. Insurance provides one way to deal with them....more
Two recent decisions emphasize yet again the value of defining and taking steps to protect a company’s trade secrets.
On May 16, 2013, Judge England issued a preliminary injunction in Farmers Insurance Exchange v....more
License agreements often contain indemnities. An indemnity is a contractual obligation to step in and reimburse some financial obligation such as a liability, loss, or damage. In essence, the party giving the indemnity will...more
Highlighted in Forbes’ Law & Technology Blog as one of Eight Great Law & Technology Resources, Orange Legal Technologies’ Unfiltered Orange Weekly eDiscovery News Update provides readers with a trusted compilation of key...more
When you enter into a contract with a vendor, you generally impose insurance requirements on the vendor and an indemnification obligation. But consider whether your current contracts have insurance requirements that would...more
Given the risks and costs of intellectual property (IP) infringement claims (even when your company isn’t found liable), most companies ideally want coverage of perceived infringement of the products they sell or the services...more
Businesses today have complex, carefully-designed insurance plans to protect against physical property loss, environmental damage, defective products and other risks. Much of a company's value, though, is now tied up in its...more
In the past six months approximately 6 class action lawsuits have been filed in Los Angeles federal district court against various companies for violations of the Computer Fraud and Abuse Act (“CFAA”), Title 18...more
On January 13, 2010, the Federal Trade Commission released a study critical of “pay-for-delay” patent litigation settlements by which brand-name drug companies pay generic competitors to keep generic drugs off the market. The...more
This paper discusses the electronic discovery uses and implications of electronic file metadata in the context of civil litigation.
It is a comprehensive overview of the different types of metadata as well as...more
Find a Science, Computers & Technology Author »
Back to Top